SlideShare a Scribd company logo
1 of 28
Presented By:
SAGAR DEOKATE
KIRAN WANGIKAR
CONTENTS

Biometrics Overview
Need of Biometrics
Working Principal
Physical Modes
Behavioral Modes
Applications
Benefits
Concern
Conclusion
Biometrics Overview

Definition:
  Automated methods of identifying or verifying the identity of a
   person based on a physiological or behavioral characteristic
  Better than traditional method.

    Physical:
      Fingerprint
      Facial Recognition
      Hand Geometry
      Iris Scan
      Retinal Scan
      DNA

    Behavioral:
      Speaker Recognition
      Signature Recognition
NEED

Traditional methods have some flaws
To secure access to building, computer system,
 laptop, phone, ATM, bank account, & many more.
For security & reduce financial fraud.
To prevent fraudulent acts like faking ID badges or
 licenses.
Types of biometric:
   1. single model biometric system.
   2. multi model biometric system.
WORKING PRINCIPAL

1.Enrollment
   Adding biometric information to data file.
2.Input Device
   Sensors, cameras etc
3. Comparison with the database.
4. Decision
WORKING
Biometrics Overview

Ways to recognize a person:
 Verification
     Matching against a single record.
     It is 1:1 matching
 Identification
     Matching against all record in the database.
     It is 1:N matching.
Error and Accuracy

2 types of errors:
False rejection: When an actual client gets identified as
 imposter.
False acceptance: When an actual imposter gets identified as
 client.
Accuracy:
FRR =number of false rejections/number of client accesses
FAR = number of false acceptance/number of client accesses
TER=(no of FA+no of FR)/total no accesses.
PHYSICAL MODES


o   Fingerprint
o   Facial Recognition
o   Hand Geometry
o   Iris Scan
o   Retinal Scan
o   DNA
Fingerprint

Typical System: fingerprint scanner maps the
 series of whorls, ridges, furrows and minutiae on
 the surface of the finger
Optical sensor and Solid State sensor are used.
Fingerprint structure
FACIAL RECOGNITION

Typical system: digital video camera input of a
  person’s face images- measures facial structure;
  compares against database
2 Methods:
Face geometry
Facial thermograph: uses infrared heat scans to identify
  facial characteristics.
HAND GEOMETRY

Analyses and computes features like length and
 width of finger, ratio of palm or fingers, width and
 thickness of the palm.
Basic procedure involves taking images of top and
 side views of hand using camera.
Iris Recognition

Iris analysis
Typical system: scanner analyzes features like rings,
 furrows, and freckles existing in the colored tissue
 surrounding the pupil.
Sophisticated camera uses infrared imager to
 capture high resolution photograph.
Advantage:
o     Iris is well protected area of eye with minimum possibility of
    injury.
Retina Scanning

Analysis of layer of blood vessels at the back of the
 eye
Typical system: low-intensity infrared light source
 and an optical coupler to scan a unique vascular
 pattern of retina and its reflection is recorded.
Most accurate and reliable method.
DNA (Deoxyribonucleic acid)

A DNA sample is used to produce either a DNA
 fingerprint or a DNA profile
Comparison of alleles of DNA sequences found in
 nuclear genetic material.
Used in medical field and forensic investigation
 purpose.
BEHAVIORAL MODE


 Speaker Recognition
 Signature Recognition
Speaker Recognition

Voice recognition and analysis
Typical system: uses the pitch, pattern, tone,
  frequency, rhythm of speech for identification
  purposes; only biometric that allows users to
  authenticate remotely.
3 types:
Fixed text method
Text dependent method
Text independent method
Signature Recognition

 Handwriting analysis
 Typical System: user will sign on a tablet, the device will
  record pressure, speed, sequence and shape of characters
  and compare to a database.
 Verification is based on features like no. of interior
  contours and no. of vertical slope components.
 Rarely used method.
Comparison Chart Accuracy/Reliability

Biometric                       Accuracy Reliability                 Errors
Fingerprint                     Very High        High                Dirt, dryness
Facial Recognition              High             Medium              Hair, glasses, age
Hand Geometry                   High             Medium              Hand injury
Iris Scan                       Very High        High                Poor lighting
Retinal Scan                    Very High        High                Glasses
DNA                             Very High        High                none
Speaker Recognition             Medium           Low                 Noise, colds
Signature Recognition           Medium           Low                 Changing signatures


Accuracy: How well can the specific biometric is able to tell individual apart
Reliability: how dependable the specific biometric is for recognition purposes
APPLICATIONS

BIOMETRIC TECH               APPLICATIONS

FINGERPRINTS             Law enforcement, entry devices for offices
                         and colleges, enterprise security; medical
                         and financial
FACIAL RECOGNITION       Automated bank tellers- user verification
                         purposes

HAND GEOMETRY            Time and attendance systems, physical
                         access

IRIS SCAN                Law Enforcement, Employee Security
                         Check, banking
RETINA SCAN         High-end security, military, power plans


DNA                 Medical applications, Paternity Tests,
                    Criminal identification and forensics




VOICE RECOGNITION   Call Centers, Law enforcement – house
                    arrest authentication



SIGNATURE           Access to documents, Banking services
What Biometrics are Replacing

Traditional verification methods:
Passwords
    PIN numbers
Tokens
    Photo ID cards
    Smart cards
    Magnetic strip cards
    Physical keys
Current Biometric Applications

 Computer logins
 ATMs
 Grocery stores
 Airport kiosks
 Driver’s licenses
 Internet banking
 National ID cards
 Welfare disbursement
 International border crossing
 Forensics – criminal identification
 Annual amusement park pass holders
 Speaker verification for television home shopping
BENEFITS

Increased security measures
Reduce costs of password and ID card maintenance
Ability to track employees and link activities
No passwords to forget
Elimination of problems such as lost/stolen
 identification cards and PIN numbers
Faster login time
Improved security of sensitive information
CONCERNS

Sensitive biometric information susceptible to
 hackers.
Lack of privacy for employees.
Costly and time consuming to implement .
CONCLUSION

Multi biometric systems have a huge potential of
 growth.
Access procedures are made simpler, faster and
 more secure.
 Especially governments, law enforcement agencies,
 military and industrial companies, already make
 partial use of this technology.
In the future biometric devices will surely become
 more involved in many civil areas.
THANK YOU!

More Related Content

What's hot

What's hot (20)

Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
BRAIN FINGERPRINTING
BRAIN FINGERPRINTINGBRAIN FINGERPRINTING
BRAIN FINGERPRINTING
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 

Viewers also liked

Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
Pratish Sardar
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Superior Airport Security screening
Superior Airport Security screening Superior Airport Security screening
Superior Airport Security screening
oldwicksy
 
Week 3 Sound and Vision Criticisms Pt1
Week 3 Sound and Vision  Criticisms Pt1Week 3 Sound and Vision  Criticisms Pt1
Week 3 Sound and Vision Criticisms Pt1
1drbuggles
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 

Viewers also liked (20)

Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Security & Biometrics LATAM Report
Security & Biometrics LATAM ReportSecurity & Biometrics LATAM Report
Security & Biometrics LATAM Report
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Superior Airport Security screening
Superior Airport Security screening Superior Airport Security screening
Superior Airport Security screening
 
Powerpoint with sound
Powerpoint with soundPowerpoint with sound
Powerpoint with sound
 
Week 3 Sound and Vision Criticisms Pt1
Week 3 Sound and Vision  Criticisms Pt1Week 3 Sound and Vision  Criticisms Pt1
Week 3 Sound and Vision Criticisms Pt1
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric
Biometric Biometric
Biometric
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 

Similar to Biometric

Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
Adam Nickey
 

Similar to Biometric (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seetu
SeetuSeetu
Seetu
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Biometric

  • 2. CONTENTS Biometrics Overview Need of Biometrics Working Principal Physical Modes Behavioral Modes Applications Benefits Concern Conclusion
  • 3. Biometrics Overview Definition:  Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic  Better than traditional method.  Physical:  Fingerprint  Facial Recognition  Hand Geometry  Iris Scan  Retinal Scan  DNA  Behavioral:  Speaker Recognition  Signature Recognition
  • 4. NEED Traditional methods have some flaws To secure access to building, computer system, laptop, phone, ATM, bank account, & many more. For security & reduce financial fraud. To prevent fraudulent acts like faking ID badges or licenses. Types of biometric: 1. single model biometric system. 2. multi model biometric system.
  • 5. WORKING PRINCIPAL 1.Enrollment  Adding biometric information to data file. 2.Input Device  Sensors, cameras etc 3. Comparison with the database. 4. Decision
  • 7. Biometrics Overview Ways to recognize a person: Verification  Matching against a single record.  It is 1:1 matching Identification  Matching against all record in the database.  It is 1:N matching.
  • 8. Error and Accuracy 2 types of errors: False rejection: When an actual client gets identified as imposter. False acceptance: When an actual imposter gets identified as client. Accuracy: FRR =number of false rejections/number of client accesses FAR = number of false acceptance/number of client accesses TER=(no of FA+no of FR)/total no accesses.
  • 9. PHYSICAL MODES o Fingerprint o Facial Recognition o Hand Geometry o Iris Scan o Retinal Scan o DNA
  • 10. Fingerprint Typical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the finger Optical sensor and Solid State sensor are used.
  • 12. FACIAL RECOGNITION Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database 2 Methods: Face geometry Facial thermograph: uses infrared heat scans to identify facial characteristics.
  • 13. HAND GEOMETRY Analyses and computes features like length and width of finger, ratio of palm or fingers, width and thickness of the palm. Basic procedure involves taking images of top and side views of hand using camera.
  • 14. Iris Recognition Iris analysis Typical system: scanner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. Sophisticated camera uses infrared imager to capture high resolution photograph. Advantage: o Iris is well protected area of eye with minimum possibility of injury.
  • 15. Retina Scanning Analysis of layer of blood vessels at the back of the eye Typical system: low-intensity infrared light source and an optical coupler to scan a unique vascular pattern of retina and its reflection is recorded. Most accurate and reliable method.
  • 16. DNA (Deoxyribonucleic acid) A DNA sample is used to produce either a DNA fingerprint or a DNA profile Comparison of alleles of DNA sequences found in nuclear genetic material. Used in medical field and forensic investigation purpose.
  • 17. BEHAVIORAL MODE  Speaker Recognition  Signature Recognition
  • 18. Speaker Recognition Voice recognition and analysis Typical system: uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely. 3 types: Fixed text method Text dependent method Text independent method
  • 19. Signature Recognition  Handwriting analysis  Typical System: user will sign on a tablet, the device will record pressure, speed, sequence and shape of characters and compare to a database.  Verification is based on features like no. of interior contours and no. of vertical slope components.  Rarely used method.
  • 20. Comparison Chart Accuracy/Reliability Biometric Accuracy Reliability Errors Fingerprint Very High High Dirt, dryness Facial Recognition High Medium Hair, glasses, age Hand Geometry High Medium Hand injury Iris Scan Very High High Poor lighting Retinal Scan Very High High Glasses DNA Very High High none Speaker Recognition Medium Low Noise, colds Signature Recognition Medium Low Changing signatures Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes
  • 21. APPLICATIONS BIOMETRIC TECH APPLICATIONS FINGERPRINTS Law enforcement, entry devices for offices and colleges, enterprise security; medical and financial FACIAL RECOGNITION Automated bank tellers- user verification purposes HAND GEOMETRY Time and attendance systems, physical access IRIS SCAN Law Enforcement, Employee Security Check, banking
  • 22. RETINA SCAN High-end security, military, power plans DNA Medical applications, Paternity Tests, Criminal identification and forensics VOICE RECOGNITION Call Centers, Law enforcement – house arrest authentication SIGNATURE Access to documents, Banking services
  • 23. What Biometrics are Replacing Traditional verification methods: Passwords  PIN numbers Tokens  Photo ID cards  Smart cards  Magnetic strip cards  Physical keys
  • 24. Current Biometric Applications  Computer logins  ATMs  Grocery stores  Airport kiosks  Driver’s licenses  Internet banking  National ID cards  Welfare disbursement  International border crossing  Forensics – criminal identification  Annual amusement park pass holders  Speaker verification for television home shopping
  • 25. BENEFITS Increased security measures Reduce costs of password and ID card maintenance Ability to track employees and link activities No passwords to forget Elimination of problems such as lost/stolen identification cards and PIN numbers Faster login time Improved security of sensitive information
  • 26. CONCERNS Sensitive biometric information susceptible to hackers. Lack of privacy for employees. Costly and time consuming to implement .
  • 27. CONCLUSION Multi biometric systems have a huge potential of growth. Access procedures are made simpler, faster and more secure.  Especially governments, law enforcement agencies, military and industrial companies, already make partial use of this technology. In the future biometric devices will surely become more involved in many civil areas.

Editor's Notes

  1. Behavioral: traits that are learned or acquired
  2. Only Biometrics can verify you as YOU. Tokens – can be lost, stolen, duplicated (some), forgotten. Passwords – can be forgotten, shared, observed, broken.
  3. Link to biometrics used in military: http://www.biometrics.dod.mil/References/BiometricUseCases.aspx